Best Practices used throughout this project
Least Privilege IAM roles and policies
Least Privilege Security Groups
Encrypt all AWS resources with custom KMS keys
Set up alarms for monitoring
Limit access to the public internet (private subnets, endpoints)
Encrypt all traffic with SSL
Continuous Integration ensures proper testing before deployment
Continuous Development and IaC ensures reproducibility
AWS
EC2, ECS, EKS, ECR, ALB, Lambda, Glue, RDS, SQS, SNS, Kinesis, Cloudwatch, IAM, KMS, Endpoints, Route53, Security Groups
Languages
Python, SQL, Linux
Open Source Frameworks
Terraform, Docker, Kubernetes - kubetctl, kustomize, helm, AWS CLI
Open Source Libraries
Snowplow, dbt, Nginx, Istio, Prometheus, Grafana, ArgoCD, Ray, Jupyter, Mlflow
CI/CD
Github Actions, AWS Codepipeline, Jenkins
Orchestration
Airflow, Prefect, AWS Eventbridge
Datawarehouse/Databases
Databricks, Snowflake, Postgres